Advertisement

Security and Privacy in Communication Networks

11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Proceedings

  • Bhavani Thuraisingham
  • XiaoFeng Wang
  • Vinod Yegneswaran
Conference proceedings SecureComm 2015

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Mobile, System and Software Security

    1. Front Matter
      Pages 1-1
    2. Yuan Zhang, Min Yang, Guofei Gu, Hao Chen
      Pages 3-22
    3. Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao
      Pages 23-40
    4. Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu
      Pages 58-77
    5. Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander
      Pages 97-115
    6. Jidong Xiao, Hai Huang, Haining Wang
      Pages 116-134
    7. Jidong Xiao, Hai Huang, Haining Wang
      Pages 135-154
  3. Cloud Security

    1. Front Matter
      Pages 155-155
    2. Hao Sun, Xiaofeng Wang, Jinshu Su, Peixin Chen
      Pages 157-174
    3. Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu et al.
      Pages 175-192
    4. Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen
      Pages 193-211
    5. Xiaojun Xiao, Yaping Lin, Wei Zhang, Xin Yao, Qi Gu
      Pages 212-229
  4. Privacy and Side Channels

    1. Front Matter
      Pages 231-231
    2. Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy
      Pages 233-255
    3. Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen
      Pages 256-276
    4. Priyabrat Dash, Chris Perkins, Ryan M. Gerdes
      Pages 294-310
  5. Web and Network Security

    1. Front Matter
      Pages 311-311
    2. Song Li, Haixin Duan, Zhiliang Wang, Xing Li
      Pages 313-329
    3. Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck
      Pages 330-347
    4. Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier
      Pages 385-400
    5. Juan D. Parra Rodriguez, Joachim Posegga
      Pages 401-417
    6. Chunqiang Hu, Xiuzhen Cheng, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun
      Pages 418-437
    7. Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill
      Pages 438-455
  6. Crypto, Protocol and Model

    1. Front Matter
      Pages 457-457
    2. Yongzheng Zhang, Tao Xu, Yipeng Wang, Jianliang Sun, Xiaoyu Zhang
      Pages 459-476
    3. Mohsen Alimomeni, Reihaneh Safavi-Naini
      Pages 477-499
    4. Xing Zhang, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang et al.
      Pages 500-518
    5. Stefan Craß, Gerson Joskowicz, Eva Kühn
      Pages 519-537
  7. Poster Session

    1. Front Matter
      Pages 557-557
    2. Dongdong Tian, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng
      Pages 559-562
    3. Xuejie Ding, Weiqing Huang, Meng Zhang, Jianlin Zhao
      Pages 567-571
    4. Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani
      Pages 572-576
    5. Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund
      Pages 577-580
    6. Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou
      Pages 581-584
    7. Karim Emara, Wolfgang Woerndl, Johann Schlichter
      Pages 590-593
    8. Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin
      Pages 594-597
    9. Degang Sun, Xinping Zhou, Zhu Wang, Changhai Ou, Weiqing Huang, Juan Ai
      Pages 598-601
  8. ATIS 2015: 6th International Workshop on Applications and Techniques in Information Security

    1. Front Matter
      Pages 603-603
    2. Ahmad Atamli-Reineh, Andrew Martin
      Pages 605-621
    3. Mozammel Chowdhury, Junbin Gao, Morshed Chowdhury
      Pages 622-632
    4. Khandakar Rabbi, Quazi Mamun
      Pages 633-648

About these proceedings

Introduction

This volume constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Security and Privacy in Communication Networks, SecureComm 2015, held in Dallas, TX, USA, in October 2015.

The 29 regular and 10 poster papers presented were carefully reviewed and selected from 107 submissions. It also presents 9 papers accepted of the workshop on Applications and Techniques in Cyber Security, ATCS 2015.

The papers are grouped in the following topics: mobile, system, and software security; cloud security; privacy and side channels; Web and network security; crypto, protocol, and model.

Keywords

Android anomaly detection attacks authentication cloud computing cryptography cyber security encryption identity management intrusion detection mobile devices mobile security network security privacy security security of data side channels smartphones software security

Editors and affiliations

  • Bhavani Thuraisingham
    • 1
  • XiaoFeng Wang
    • 2
  • Vinod Yegneswaran
    • 3
  1. 1.The University of Texas at DallasRichardsonUSA
  2. 2.Indiana University at BloomingtonBloomingtonUSA
  3. 3.SRI InternationalMenlo ParkUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-28865-9
  • Copyright Information Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-28864-2
  • Online ISBN 978-3-319-28865-9
  • Series Print ISSN 1867-8211
  • Series Online ISSN 1867-822X
  • Buy this book on publisher's site